Penetration Testing mailing list archives
Re: Using viruses in pen-test
From: "David Swafford" <dswafford () alterhighschool org>
Date: Wed, 11 Oct 2006 17:13:18 -0400
I wonder if there is some type of "fake" virus you could use in this case. I know in a pen test you are hired to do the job asked, but I would hate for you to have to face your client after a "pen test gone bad" kind of situation where something backfired leaving the whole network in shambles from a massive virus outbreak. Clients sometimes don't always understand what they are truly asking (ie. the impact it might cause). I'm not sure how skilled you are at writing code but the option of writing a new virus which simulated something dangerous (but didn't actually damage anything valuable) might be a way to test to see if the anti-virus software doing its job on the "zero day" part (based on heuristic scanning). David. ____________________________________________________ David A. Swafford, Network Engineer Information Technology Team Archbishop Alter High School EC-Council Certified Ethical Hacker A Cisco Systems, Inc., Certified Network Associate (CCNA) and a CompTIA Network+ and Security+ Certified Professional
"neo anderson" <amol.netsec () gmail com> 10/11/2006 3:08 am >>>
Hi List, I wish to know your views on "Using viruses in pen-test"I I've been working in the infosec domain for over 2 years with a couple of infosec certs including CEH and conducting pen-tests for my clients for about a year. My recent client has hired me for carrying out "every possible" type of pen test. This includes testing organizations defence mechanism against viruses as well, this includes to test whether anti-virus administrators have up-to-date virus definitions etc. I'm supposed to gather this information by means of thorough penetration tests only. As we all are aware that how the viruses (worms/trojans included) enter into the corporate network propagate over LAN. There are many ways like email attachments or infected content brought in by employee.It spreads on itself thereafter. Now my question: Is there any standard procedure to test the posture of organizations network security against potential virus threats? I mean i wish to know about pen-test carried out against Antivirus-product. In order to replicate itself, a virus must be permitted to execute code and/or write to memory. Thus this pen-test should also tests that. And do I need to use some known viruses for this kind of pen-test? Have your thoughts on this topic please. Thanking you all. ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------ _____________________________________ Note: this message has been scanned for viruses and mal-ware prior to leaving the Archbishop Alter High School Information Technology Network. Please report all possible solicitation and infected messages to abuse () alterhighschool org, Thank you. ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- Using viruses in pen-test neo anderson (Oct 11)
- RE: Using viruses in pen-test lists (Oct 11)
- Re: Using viruses in pen-test David Swafford (Oct 11)
- RE: Using viruses in pen-test Clint Laskowski (Oct 12)
- Re: Using viruses in pen-test c0redump (Oct 13)
- RE: Using viruses in pen-test Clint Laskowski (Oct 12)
- RE: Using viruses in pen-test Omar Herrera (Oct 11)
- Re: Using viruses in pen-test Christoph Puppe (Oct 12)
- <Possible follow-ups>
- RE: Using viruses in pen-test Hagen, Eric (Oct 11)